AMERICAN REMAINS

Opening Reception: Saturday, January 31st from 6:00 pm – 9:00 pm

The salon at automatic sweat is pleased to announce American Remains, an exhibition of sculptures and installations by SeMeN SPeRmS and Nick Stewart.

The exhibition presents a collection of artifacts from a proposed mythology that straddles the indistinct line between American history and rural legend. Inspired by the decrepit highway-side nowhere towns of the southwest, the works offer warped satellite dishes and abandoned single-wide trailers as the weathered remnants of westward expansion. These ubiquitous emblems of a proud historical narrative about a prosperous America are presented alongside idiosyncratic icons of contemporary desert folklore, characterized by supernatural suspicion, eerie phenomena and UFO sightings.

Nick Stewart’s objects seek to excavate desert myth in the form of mutilated cattle hides shaped into six-pack-rings, which have been branded with a design that evokes both astral patterns and the corporate logo of an automobile manufacturer. Familiar objects such as a dented street lamp are distorted into paranormal forms, while satellite dishes specked with metal lesions , assume a watchful, almost anthropomorphic presence.

SeMeN SPeRmS sculptures reconstruct and reframe the desolate desert scape from a distance, dwarfing its earthly immensity and depriving it of anthropological context until the barren topography starts to seem post-apocalyptic, if not entirely lunar. The homespun style of his miniatures elude to a tradition of model hobbyists, while the bleak content matter disturbs the quaint escapism of toy model sets. The artists’ American desert is not an open expanse of freedom shaped by the antiquated tale of manifest destiny, but instead a barren celestial surface, a post-apocalyptic wasteland and government test-site.

American Remains considers the place of this contemporary American folklore within the historical narrative of the nation, forcing questions about the filters that parse national fact from fiction, Roswellian syndrome from national heritage. In this exhibit, the patriotic voices of the founding fathers are forced into direct dialogue with desert dwelling lunatics preaching about crop circles from the pages of the national enquirer. It is both a history text book and a camp fire story; a CNN headline and a wives tale muttered by the town drunk from his bar stool pedestal.
written by Claire Bargout

This bizarre collection of Moog compositions is credited to a band/artist named Lucifer (or is it “Black Mass?”), but the man behind the machine is better known by his more ordinary given name of Mort Garson. Along with scoring films, producing easy listening records, and co-writing the hit tune “Our Day Will Come,” Garson released several electronic music LPs with themes like the Zodiac, the Wizard of Oz, and plant growth stimulation. Black Mass/Lucifer (the cover art is ambiguous as to title) is Garson‘s exploration of the dark arts, an all-instrumental soundtrack for a horror film that never existed. Garson conjures up a sinister, minor-key atmosphere on tracks with titles like “Incubus,” “Witch Trial,” and “The Evil Eye” often achieving a tone similar to the scores that Italian horror-rock band Goblin would record for Dario Argento films later in the decade. The technology available to Garson in 1971 was still being developed, and the record occasionally sounds dated, particularly when some very corny synthetic drums ruin the mood. There’s some evocative music on Black Mass/Lucifer, to be sure, but ultimately it’s just not as wild of a recording as legend has painted, perfectly rendered for a psychedelic Halloween party but hardly strong enough to raise evil spirits on its own. Garson‘s Wozard of Iz album is a freakier Moog ride, a kaleidoscopic retelling of the L. Frank Baum tale. – All Music

.

.

There’s a set of photos making the rounds on the Internet these days, but even though they recently went viral, they were actually released a year ago. They show a bunch of normal-looking walnuts that when cracked open reveal a very hard filling – concrete pebbles. According to Ministry of Tofu, these fake walnuts were bought by a certain Mr. Li, last February, from a street vendor in Zhengzou, Henan province. When he got home and started cracking them, he noticed that instead of a meaty seed, many were actually filled with concrete pebbles wrapped in tissue. But Li’s case is not an isolated one. Apparently, many Chinese walnut vendors try to maximize their profits by carefully cracking open the hard shell, taking out the nutmeat, replacing it with concrete and tissue so it doesn’t make a strange noise, and gluing it shut. This way they can sell the nuts and the seeds separately.

.

.

So it would’ve cost more than $211,000, and that’s before ResultSource’s fee, which is typically more than $20,000. Kaplan settled for making the Journal’s list, reaching the pre-sale figure of 3,000 by securing commitments from corporate clients, who agreed to buy copies as part of his speaking fees, and by buying copies for himself to resell at public appearances. Kaplan expresses significant reservations about taking part in what is essentially a laundering operation aimed at deceiving the book-buying public into believing a title is more in-demand than it is. “It’s no wonder few people in the industry want to talk about bestseller campaigns,” he writes “Put bluntly, they allow people with enough money, contacts, and know-how to buy their way onto bestseller lists.”

.

.

I was 17, and the owner of an irregular music collection that numbered about 20 albums, most of them a real shame (OMC’s How Bizarre, the Grease 2 soundtrack). One day I had unsupervised access to the family PC and, for reasons forgotten, an urge to hear the campy orchestral number from the film Austin Powers. I was a model Napster user: internet-equipped, impatient and mostly ignorant of the ethical and legal particulars of peer-to-peer file-sharing. I installed the software, searched Napster’s vast list of MP3 files, and soon had Soul Bossa Nova plinking kilobyte by kilobyte on to my hard drive. “It’s difficult to describe to people… how much material was suddenly available,” the technology guru John Perry Barlow tells Alex Winter, the director of Downloaded, in his new documentary. Speaking to me on the phone from the US, Winter added: “There was no ramp up. There was no transition. It was like that famous shot from 2001: A Space Odyssey, when the prehistoric monkey throws a b…

.

.

The US Library of Congress welcomed Moby Dick onto its vaunted shelves this week but it wasn’t the famous Herman Melville-penned whale tale version oh no, it was the version told exclusively in emoticon – you know those little signs like J, ;). Emoji are the emoticons typically used in Japanese texting though they obviously are used world-wide to annoy or entertain everyone depending on your opinion of them. Called “Emoji Dick,” the emoticon book project was undertaken back in 2009 by data engineer Fred Benenson. According to the Library of Congress’ blog, in 2009 Benenson started a campaign to fund the “Emoji Dick” project and within a month raised enough money to put it together – $3,500.

Fans sprayed with debris. Someone got mashed by a tire. NASCAR tried to take this down.

.

.

.

.

According to Las Vegas Metro Police, an officer was patrolling the 300 block of N. 16th st. Tuesday when he came across a naked woman who appeared to be engaged in sexual relations with a dog. Officers arrived on the scene to find the woman, who was still undressed, laying on the ground. When the woman saw officers approaching, she said “Hi” to them and then began fondling the dog in a sexual manner.

.

.

CNN may have just posted their best piece of investigative journalism in years. In the following video, three drivers of varying ages got incredibly high on marijuana and test-drove cars around a course. A driving-ed instructor accompanied them to avert any chance of an accident, and police watched from the sidelines to spot any visible ‘signs’ of inebriation in their movements.

.

.

Remember that Higgs-like particle that scientists finally managed to pin down last year at the Large Hadron Collider? Well, it’s proving to be a harbinger of bad news. According to Joseph Lykken, a theoretical physicist at the Fermi National Accelerator Laboratory, the mass of the Higgs boson indicates that “the universe we live in is inherently unstable, and at some point billions of years from now it’s all going to get wiped out.”

.

.

I love this. I know that the comments are going to be filled with people decrying the destructive aspects of ‘Gallon Smashing,’ and they’re not wrong, but there’s so much that’s great about this concept. There’s a level of straight up slapstick comedy that is incredible. This kid (is it the same kid every time? I think it might be) has the moves of a silent comedy star. I like that the prank isn’t necessarily about getting other people wet or anything (although that happens, as is the unpredictable nature of smashing gallons of milk). And I like that this guy seems to be in his teens – exactly the right age to be doing stupid, destructive, anti-social prank behavior. When frat boys start doing this it won’t be funny.

.

.

The list of 10 tips by the University of Colorado at Colorado Springs was billed as “last resort” options to deter a sexual assault. “Tell your attacker that you have a disease or are menstruating,” read one tip. “Vomiting or urinating may also convince the attacker to leave you alone,” read another.

Thanks Jasmine

.

.

For example, the following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today: Being young (if you live near a battle zone, you are fair game; and see this) Using social media Reporting or doing journalism Speaking out against government policies Protesting anything (such as participating in the “Occupy” movement) Questioning war (even though war reduces our national security; and see this) Criticizing the government’s targeting of innocent civilians with drones (although killing innocent civilians with drones is one of the main things which increases terrorism. And see this) Asking questions about pollution (even at a public Congressional hearing?) Paying cash at an Internet cafe Asking questions about Wall Street shenanigans Holding gold Creating alternative currencies Stocking up on more than 7 days of food (even though all Mormons are taught to stockpile food, and most …

.

.

Earlier this month, “revenge porn” entrepreneur Craig Brittain sat for an on-camera interview with CBS4-Denver, where he explained how his website IsAnybodyDown is nothing more than “entertainment.” Brittain’s site shows nude pictures of people, mostly women, without their consent, along with their personal contact info. The website advertises links to a service called “Takedown Hammer” which promises to get victims off the site if they pay $250. Many assume the “Hammer” is Brittain, since its e-mails come from the same IP address; Brittain denies it. In any case, to many of the victims, Brittain’s site looks like a simple extortion scheme.

.

.

Facebook, Twitter, The New York Times. The United States of America. All seemingly hacked by the Chinese. China. Seemingly hacked by the US. Big time. But is there another option? “At least 40 companies including Apple Inc., Facebook Inc. and Twitter Inc. were targeted in malware attacks linked to an Eastern European gang of hackers that is trying steal company secrets, two people familiar with the matter said.” Bloomberg Chinese-hackers According to Tom Kellerman of Trend Micro there could well be – “We’ve all been watching China, but they’re not the most advanced cybercriminals. The most advanced are from the Eastern Bloc and Russia.” Tom Kellerman via CNN

.

.

A protest staged by dairy farmers in Brussels has entered its second day. Farmers sprayed thousands of litres of fresh milk at the European Parliament in Brussels on Monday in protest at what they say are excessive milk quotas and prices below the cost of production.

.

.

The testimony at the hearing made it very clear that airport security is only as strong as its weakest link. This seems self-evident. Yet, despite all the money and manpower wasted on airport security theater in this country and around the world, perimeter security remains so lax that a guy with a costume and some bolt cutters can make a hole large enough to drive a van through. This is great news for heist fans, to be sure. But it’s pretty alarming for everyone else.

.

.

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that’s only half the story. The Internet empowers everyone. Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use it more effectively. Governments and corporations have woken up to the fact that not only can they use the Internet, they can control it for their interests. Unless we start deliberately debating the future we want to live in, and the role of information technology in enabling that world, we will end up with an Internet that benefits existing power structures and not society in general.

.

.

Porn legend Ron Jeremy, 59, has been released from hospital after a near-death experience and he’s already planning on getting back to business. Doctors have told the prolific star that he’s cleared to have sex after he left Cedars-Sinai Medical Center in Los Angeles around week ago.

.

.

.

.

“I had a sinking felling because my porn collection is valuable, man,” Johnson told WZZM 13. Johnson collects rare performances by black adult film stars that were difficult for him to find and impossible to replace. He says the stolen pornography collection is worth $7,500, much more than the televisions that were taken. “I had a collection that had every African American that’s ever been in porn, from the 70s up until now,” explained Johnson. “My collection was the best in Michigan– a guy in Connecticut told me that,” said Johnson. He believes the thieves realized the value when they stumbled on the porn. “They came upon it and looked at the titles and realized what they had ran across… and realized people will pay cash money for them DVDs.” Johnson says his rare footage can’t be found on the internet. “I trade and I collect and I look at them too. I ain’t got no problem with that,” said Johnson.

.

.

The BGI Cognitive Genomics Project is currently doing whole-genome sequencing of 1,000 very-high-IQ people around the world, hunting for sets of sets of IQ-predicting alleles. I know because I recently contributed my DNA to the project, not fully understanding the implications. These IQ gene-sets will be found eventually—but will probably be used mostly in China, for China. Potentially, the results would allow all Chinese couples to maximize the intelligence of their offspring by selecting among their own fertilized eggs for the one or two that include the highest likelihood of the highest intelligence. Given the Mendelian genetic lottery, the kids produced by any one couple typically differ by 5 to 15 IQ points. So this method of “preimplantation embryo selection” might allow IQ within every Chinese family to increase by 5 to 15 IQ points per generation. After a couple of generations, it would be game over for Western global competitiveness.

.

.

Starting next week, most U.S. Internet users will be subject to a new copyright enforcement system that could slow the Internet to a crawl and force violators to take educational courses. A source with direct knowledge of the Copyright Alert System (CAS), who asked not to be named, has told the Daily Dot that the five participating Internet service providers (ISPs) will start the controversial program Monday. The ISPs—industry giants AT&T, Cablevision, Comcast, Time Warner, and Verizon—will launch their versions of the CAS on different days throughout the week. Comcast is expected to be the first, on Monday.

.

.

Now, people are being warned about another risk of finding love in the online world – webcam extortion. Webcam extortion. Image from ShutterstockBut it’s not the familiar headline of perverted hackers blackmailing young women into stripping in front of the camera. This time the tables have turned, and it’s *men* who are being victimised by *women*, in a peculiar twist on traditional webcam extortion. Singapore’s Police Force has warned of femme fatales befriending potential victims on sites such as Facebook and Tagged.com. The women enter steamy webcam conversations with their prey, where they strip and encourage their male victim to do the same. What the man doesn’t realise, as he feverishly rips his clothes off and agrees to engage in various sexual acts in front of the camera, is that his female love interest is secretly recording everything that’s going on. The male victim is then blackmailed for money by the woman who threatens to circulate the compromising photographs

.

.

Of course, we’ve seen this pattern over and over and over. The government uses “terrorism” as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process. Stingrays are particularly odious given they give police dangerous “general warrant” powers, which the founding fathers specifically drafted the Fourth Amendment to prevent. In pre-revolutionary America, British soldiers used “general warrants” as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched. The Stingray is the digital equivalent of the pre-revolutionary British soldier. It allows police to point a cell phone signal into all the houses in a particular neighborhood, searching for one target while sucking up everyone else’s location along with it. With one search the police could potentially invade count…

.

.

“Slave Labor (Bunting Boy),” a 2012 work by the mysterious British graffiti artist Banksy, has vanished from a wall outside a discount store in London, and turned up at an auction house in Miami. And the town council in Haringey, the north London borough where the Banksy work appeared last May and disappeared last week, say that they want the piece returned. The stenciled piece, which shows a young boy at an old fashioned sewing machine creating a string of Union Jacks – the flags are in bright red, white and blue; the rest of the picture is in black, white, grey and sepia – appeared last year during the celebrations commemorating Queen Elizabeth’s 60 years on the throne. It was taken as an acerbic social comment, as most of Banksy’s works are, and has been regarded as a cultural attraction in the Turnpike Lane neighborhood where it stood.

.

.

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency doesn’t mean that they’re happening with greater frequency. Hype aside, the Mandiant report on the hackers is very good, especially the part where the Chinese hackers outted themselves through poor opsec: they logged into Facebook from their work computers. But this is not cyberwar. This is not war of any kind. This is espionage, and the difference is important. Calling it war just feeds our fears and fuels the cyberwar arms race.

.

.

JSAN is a writing style anonymization framework. It consists of two parts: JStylo and Anonymouth. JStylo is a standalone platform for authorship attribution. It is used as an underlying feature extraction and authorship attribution engine. Anonymouth is the writing style anonymization platform. It uses the extracted stylometric features and classification results obtained through JStylo and suggests users changes to anonymize their writing style.

.

.

It’s been used to question or confirm the authorship of Shakespeare’s plays, Homer’s Illiad and Odyssey and St Paul’s letters for hundreds of years. Now the science of stylometry could be used in the fight against hackers, trolls and malware writers that wreak havoc on the web. At the same time, stylometry – the analysis of a person’s unique writing style – could also be used by employers to identify whistleblowers or whingers among their staff. What you say online could be traced back to you using stylometry. “Your writing style can give you away and on the internet anonymity is difficult to achieve,” say the US researchers who have developed online tools to analyse writing. Advertisement The researchers, from Drexel University in Philadelphia, studied the leaked conversations and contributions of hundreds of anonymous users in underground online forums. They were able to identify 80 per cent of users using stylometric analysis to match writing styles to authors.

.

.

Barnacles are known for having very long penises. National Geographic reported in 2008: To cope with changing tides and a sedentary lifestyle, the gnarly crustaceans have evolved penises that are eight times the length of their bodies—the longest relative to body size of any animal. My sedentary lifestyle has had no such effect. I feel cheated. That article also noted that barnacles have the ability to change the size and shape of their penises to suit their living conditions. Barnacles living in gentle waters have long, thin penises best equipped for maximum reach, the study found. But those animals living in rough waters have shorter, stouter penises that are better able to withstand strong waves. […] The researchers also transplanted barnacles living in gentle waters to rough waters and vice versa, to make sure the penis variations they observed were a result of the environment and not due to genetic differences. The results showed that barnacles coul…

.

.

Facebook OAuth is used to communicate between Applications & Facebook users, to grant additional permissions to your favorite apps. To make this possible, users have to ‘allow or accept’ the application request so that app can access your account information with required permissions. As a normal Facebook user we always think that it is better than entering your Facebook credentials, we can just allow specific permissions to an app in order to make it work with your account.

More than 200 years of disease and death transmitted through metzitzah b’peh, the direct mouth-to-genital suction done by mohels to the bleeding just-circumcised-penises of baby boys.

.

.

The document includes advice such as “hide under thick trees” (believed to be bin Laden’s contribution), and instructions for setting up a “fake gathering” using dolls to “mislead the enemy”. Found by the Associated Press in a building in Timbuktu, the ancient city occupied by Islamists last year, the document is believed to have been abandoned as extremists fled a French military intervention last month. It is a Xeroxed copy of a tipsheet authored by a Yemeni extremist that has been published on some jihadi forums, but that has made little appearance in English. The list reflects how al-Qaeda in the Islamic Maghbreb anticipated a military intervention that would make use of drones, as the war on terror shifts from the ground to the air.